Overview
What is its Purpose?
What is its Purpose?
Centralized Management
SSL/TLS Management
Query Optimization
Sharing Feature
Working Principle
Working Principle
Connection Initiation
Connection Pool Management
Authentication
Data Communication
Connection Management
Error Management
Usage Areas
Usage Areas
Authentication
User Querying
Authorization
SSL/TLS Audit
Technical Features and Capabilities
Basic Features
Basic Features
Certificate Requirement Policies
Search Scope and Filtering
Environment Variable Support
Environment-Based Configuration
Enable/Disable Control
Advanced Features
Advanced Features
Move to Global Sharing
Revoked Certificate Separation
Deployment Result Monitoring
Connection Test Feature
Export/Import Feature
Connection Monitoring
Connection Parameters
Mandatory Parameters
Mandatory Parameters
Name
Example Value:
Production_LDAPNotes: Should not start with space, special characters should not be used
Server Address
Example Value:
ldaps://directory.example.com:636Notes: Can be selected with environment variable
Require Certificate Type
Example Value: REQUIRED_CN
Notes: If REQUIRED_AN_PN is selected, certificateId becomes mandatory
Search Scope
Example Value: SUBTREE
Notes: One of OBJECT, ONE_LEVEL, or SUBTREE values is selected
Base DN
Example Value:
ou=Users,dc=corp,dc=localNotes: Environment variable can be used; cannot be left empty for validation
Optional Parameters
Optional Parameters
Use SSL
Default Value: false
Recommended Value: true (in Production environment)
Username
Default Value: (Empty)
Recommended Value: svc_ldap_reader or environment variable
Password
Default Value: (Empty)
Recommended Value: Secret Manager variable
Custom Filter
Default Value: (Empty)
Recommended Value: LDAP filter expression
Certificate Id
Default Value: (Empty)
Recommended Value: UUID (mandatory when REQUIRED_AN_PN is selected)
Timeout and Connection Pool Parameters
Connection Timeout
Default: 10000
Min: 2000 | Max: 60000
Unit: milliseconds
Request Timeout
Default: 30000
Min: 5000 | Max: 120000
Unit: milliseconds
Pool Size
Default: 20
Min: 1 | Max: 50
Unit: count
Bind Retry Interval
Default: 2000
Min: 500 | Max: 10000
Unit: milliseconds
Usage Scenarios
Single Authentication
Solution: Server Address=ldaps://auth.corp:636, Use SSL=true, Require Certificate Type=REQUIRED_CN
Expected Behavior: Users are verified with TLS-protected bind
Group-Based Authorization Control
Solution: Group filter with Custom Filter
Expected Behavior: Flow lists only relevant members
Management Console Integration
Solution: Move to Global is executed, selectedEnvironmentId=manager
Expected Behavior: Management console uses the same connection
Service Account Rotation
Solution: Username and Password environment variable
Expected Behavior: No need to update connection when password changes
Certificate Required Environment
Solution: Require Certificate Type=REQUIRED_AN_PN, Certificate Id=UUID
Expected Behavior: Bind is rejected without certificate verification
High Traffic Queries
Solution: Pool Size=30, Connection Timeout=5000
Expected Behavior: Connections are reused thanks to pool
Connection Configuration
Creating New LDAP Pool Connection

Configuration Steps
Navigating to Creation Page
- Go to Connection → LDAP Pool Connection section from the left menu.
- Click the [+ Create] button at the top right.
- The new LDAP Pool Connection creation form opens.
Entering Basic Information
- Find the Enable Status toggle at the top of the form.
- Set the toggle to Active position (active by default).
- If you want to make the Connection passive, set the toggle to Passive position.
- Passive connections cannot be used in Integration Flows but their configurations are preserved.
- Enter a unique connection name in the Name field.
- Name examples:
Production_LDAP,Test_LDAPConnection,Dev_LDAP_Auth - Name rules:
- Should not start with space
- Special characters should not be used (recommended: letters, numbers, underscore)
- Maximum 255 characters
- System automatically checks as you type:
- Green checkmark: Name is available
- Red X mark: Name already exists, choose a different name
- Enter a text describing the purpose of the connection in the Description field.
- Example descriptions:
- “Portal LDAP access”
- “Production environment Active Directory connection”
- “Dummy LDAP connection for test environment”
- There is a maximum 1000 character limit.
- This field can be left empty.
Environment Selection
- Find the Environment dropdown menu.
- Open the dropdown menu and select one of the following options:
- Development: For development environment
- Test: For test environment
- Production: For production environment
- Different connection parameters can be defined for each environment.
- Environment selection determines in which environment the connection will be active.
- Test Connection button remains disabled until environment is selected.
LDAP Specific Parameters - Section 1
- Enter the LDAP server address in the Server Address field.
- Format:
ldaps://directory.example.com:636orldap://directory.example.com:389 - You can select environment variable
- Port 636 is used for LDAPS, port 389 for LDAP.
- Select from the Search Scope dropdown menu:
- OBJECT: Searches only a single entry
- ONE_LEVEL: Searches the first level of the specified OU
- SUBTREE: Searches entries in the entire subtree
- Select according to performance requirements.
- Enter the distinguished name where searches will start in the Base DN field.
- Example:
ou=Users,dc=corp,dc=local - Environment variable can be used
- Cannot be left empty for validation.
- Enter additional LDAP filter expression in the Custom Filter field.
- Example LDAP filter expression
- This field can be left empty.
LDAP Specific Parameters - Section 2
- Select from the Require Certificate Type dropdown menu:
- NOT_REQUIRED: Certificate verification not required
- REQUIRED_CN: Common Name verification required
- REQUIRED_AN_PN: Alternative Name or Principal Name verification required
- When REQUIRED_AN_PN is selected, Certificate Id becomes mandatory.
- When Require Certificate Type REQUIRED_AN_PN is selected, the Certificate Id field becomes visible.
- Select the certificate from Secret Manager.
- Certificate ID is entered in UUID format.
- Find the Use SSL checkbox.
- Check the checkbox for LDAPS communication.
- Should be set to true in Production environment.
- Enter the service account to be used for bind operation in the Username field.
- Example:
svc_ldap_reader - You can select environment variable
- This field can be left empty (anonymous bind).
- If Username is filled, the Password field becomes visible.
- Enter the password of the bind account.
- Secret Manager variable is recommended
- Password will appear masked for security reasons.
Timeout and Connection Pool Settings
- Enter the maximum time to connect to LDAP server in the Connection Timeout field.
- Default: 10000 milliseconds (10 seconds)
- Minimum: 2000, Maximum: 60000 milliseconds
- Enter the wait time for search/bind response in the Request Timeout field.
- Default: 30000 milliseconds (30 seconds)
- Minimum: 5000, Maximum: 120000 milliseconds
- Enter the maximum number of connections to keep open simultaneously in the Pool Size field.
- Default: 20
- Minimum: 1, Maximum: 50
- Increase Pool Size value if traffic increases.
- Warning: Values higher than necessary may strain the target LDAP server.
- Enter the wait time between failed bind attempts in the Bind Retry Interval field.
- Default: 2000 milliseconds
- Minimum: 500, Maximum: 10000 milliseconds
Security and Authentication Settings
- Link Username/password fields to secret manager variables.
- This way, there is no need to update the connection when the password changes.
- Keep SSL/TLS field mandatory in Production environment.
- Check the Use SSL checkbox.
- Use port 636 for LDAPS.
- Update the connection during certificate renewals.
- Update Certificate Id with the new certificate.
- Verify by running Test Connection.
Test Connection
- Find the [Test Connection] button at the bottom of the form or at the top right corner.
- Button remains disabled until environment is selected.
- Click the button.
- System tests connection parameters:
- Connection is established to LDAP server
- Authentication is performed (if Username/Password is filled)
- Certificate verification is performed (if Require Certificate Type is active)
- Bind operation is tested
- Test result:
- Successful: Green confirmation message is displayed, such as “Connection test successful”
- Failed: Red error message is displayed, error details are shown
- Remember that overlay is shown during test for critical fields using environment variables.
- In case of error:
- Read the error message
- Check relevant parameters (Server Address, Base DN, Username, Password)
- Check firewall and network settings
- Check LDAP server health
- Fix parameters and test again until test is successful.
Saving and Deploying
- Make sure all mandatory fields are filled.
- Verify that Test connection is successful (recommended).
- Click the [Save and Deploy] button at the top right corner of the form.
- System saves the connection and deploys it to the selected environment.
- After successful save:
- You are redirected to the connection list page
- New connection appears in the list
- Connection becomes Enabled status
- Becomes available for use in Integration Flow and Connector steps
- Name field is unique and valid
- Server Address is filled
- Search Scope is selected
- Base DN is filled
- Require Certificate Type is selected
- Certificate Id is filled if REQUIRED_AN_PN is selected
- Environment is selected
- Test Connection is successful (recommended)
- All mandatory fields are filled
- Connection is successfully created and saved
- Becomes active in the selected environment
- Connection selection can be made in Integration Flow and Connector steps
- Is displayed and can be managed in the connection list
Deleting Connection
Deletion Process
Deletion Tips
Alternative: Deactivate
Exporting/Importing Connection
Export
Export
Method 1
Method 2
File Format
Date-connection-LDAP Pool Connection-export.zipExample:
13 Nov 2025-connection-Production_LDAP-export.zipZIP Contents
- Connection JSON file
- Metadata information
- Dependency information (e.g., certificates, key store)
Usage Areas
- Backup
- Moving between environments (Test → Prod)
- Versioning
- Team or project-based sharing
Import
Import
Import Steps
- Click the [Import LDAP Pool Connection] button on the main list.
- Select the downloaded ZIP file.
- System checks: Is format valid? Is there a name conflict? Are dependencies available?
- Then click the [Import] button.
Import Scenarios
Connection Usage Areas
Creating and Activating Connection
- Create the connection.
- Verify the connection with Test Connection.
- Save and activate with Save and Deploy.
- Make sure the connection is in Enabled status
Usage in Integration / Connector Steps
Scheduled Job Usage
Test Purpose Usage
Best Practices
Things to Do and Best Practices
Things to Do and Best Practices
Service Account Management
Good: Creating a read-only service account.
Best: Defining OU-based limited privilege service accounts and planning password rotation
Certificate Lifecycle
Good: Manually tracking certificate expiration dates.
Best: Setting up automatic alerts with Secret Manager and event log, renewing REQUIRED_AN_PN connections in advance
Search Scope Selection
Good: Using ONE_LEVEL for OU-based queries.
Best: Determining scope according to usage scenario and reducing unnecessary attribute reads
Environment Variable Usage
Good: Hiding with environment variable.
Best: Feeding variables from Secret Manager and auditing access logs
Environment Management
Good: Creating separate connections for each environment.
Best: Managing all environments in a single connection using Environment option, only changing environment during inter-environment transitions
Connection Test
Good: Verifying with Test Connection before saving.
Best: Testing after every parameter change, performing full integration test in test environment before moving to production
Security Best Practices
Security Best Practices
LDAPS Requirement
RBAC and Move to Global
Environment Variable Monitoring
Credential Management
SSL/TLS Usage
Access Control
Things to Avoid
Things to Avoid
Using Anonymous Bind
Alternative: Bind with read-only service account
Unnecessary SUBTREE Queries
Alternative: Select ONE_LEVEL or OBJECT scope, narrow with customFilter
Disabling Certificate Control
Alternative: Set Require Certificate Type field to REQUIRED_CN or REQUIRED_AN_PN according to corporate policy
Using Production Connection in Test Environment
Alternative: Create separate connections for each environment, use environment parameter, separate connection names by adding prefix according to environment (Test_, Prod_)
Very Low Timeout Values
Alternative: Adjust timeout values according to real usage scenarios, measure network latency and determine timeouts accordingly
Not Using Connection Pool
Alternative: Activate connection pool, adjust pool size according to traffic volume, set up pool monitoring
Performance Tips
Performance Tips
Search Scope Optimization
Impact: Number of entries sent to LDAP server decreases, response time shortens
Environment Variable Cache
Impact: Parameter read time decreases, overlay is less visible for Test Connection
Certificate Rotation Plan
Impact: Your security level is maintained without experiencing LDAPS interruption
Connection Pool Optimization
Impact: Connection opening cost decreases by 80%, response times decrease, resource usage is optimized
Timeout Values Optimization
Impact: Unnecessary waits are prevented, fast fail-over is provided, user experience improves
Connection Monitoring
Impact: Problems are detected proactively, performance bottlenecks are identified early, downtime decreases
Troubleshooting
LDAP Search Returns No Results
LDAP Search Returns No Results
Scope Value
Custom Filter
Base DN Verification
Certificate Validation Failed
Certificate Validation Failed
Certificate Status
Certificate Import
RequireCertificateType
Connection Timeout
Connection Timeout
Network Check
System Health
Timeout Settings
Log Review
Authentication Failed
Authentication Failed
Credentials
User Status
Authorization Check
Certificate Check
Pool Exhausted
Pool Exhausted
Pool Size
Connection Check
Idle Timeout
Metric Monitoring
Connection Test Successful But Integration Flow Gives Error
Connection Test Successful But Integration Flow Gives Error
Enable Toggle
Connection Selection
Connection Deploy
Flow/Job Deploy
Log Check
Frequently Asked Questions (FAQ)
Can I define multiple Base DNs in LDAP connection?
Can I define multiple Base DNs in LDAP connection?
Why does Test Connection become passive when I use environment variable?
Why does Test Connection become passive when I use environment variable?
What do EnumSearchScope values do?
What do EnumSearchScope values do?
What should I do if certificate appears in revoked list?
What should I do if certificate appears in revoked list?
How are parameters affected when I change Environment selection?
How are parameters affected when I change Environment selection?
Can I use the same connection in multiple Integration Flows?
Can I use the same connection in multiple Integration Flows?
Is using connection pool mandatory?
Is using connection pool mandatory?
Should I create different connections for Test and Production?
Should I create different connections for Test and Production?
Test Connection is successful but not working in Integration Flow, why?
Test Connection is successful but not working in Integration Flow, why?
- Connection enable toggle may be passive
- A different connection may be selected in Integration step
- Connection may not be deployed
- Integration Flow may not have been redeployed yet

